让您全面了解并上手亿速云产品
常见入门级使用教程
对外 API 开发文档中心
您历史提交的工单
您的每一条意见,我们都严谨处理
您的每一条建议,我们都认真对待
CNNVD-ID编号 | CNNVD-201912-284 | CVE编号 | CVE-2019-19447 |
发布时间 | 2019-12-07 | 更新时间 | 2021-02-04 |
漏洞类型 | 资源管理错误 | 漏洞来源 | N/A |
危险等级 | 高危 | 威胁类型 | 本地 |
厂商 | N/A |
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。
Linux kernel 5.0.21版本中的fs/ext4/super.c文件的‘ext4_put_super’函数存在资源管理错误漏洞。攻击者可借助特制的ext4文件系统镜像利用该漏洞执行任意代码或导致拒绝服务。
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:
https://www.kernel.org/
来源:MISC
链接:https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447
来源:CONFIRM
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html
来源:www.auscert.org.au
来源:www.ibm.com
来源:www.auscert.org.au
来源:www.ibm.com
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160201/Red-Hat-Security-Advisory-2020-5206-01.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160682/Red-Hat-Security-Advisory-2020-5656-01.html
来源:access.redhat.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159814/Red-Hat-Security-Advisory-2020-4431-01.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Linux-kernel-use-after-free-via-ext4-put-super-31094
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.ibm.com
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:nvd.nist.gov
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160495/Red-Hat-Security-Advisory-2020-5430-01.html
暂无